- Description
- authentik is an open-source identity provider. Prior to versions 2024.12.4 and 2025.2.3, when authentik was configured to use the database for session storage (which is a non-default setting), deleting sessions via the Web Interface or the API would not revoke the session and the session holder would continue to have access to authentik. authentik 2025.2.3 and 2024.12.4 fix this issue. Switching to the cache-based session storage until the authentik instance can be upgraded is recommended. This will however also delete all existing sessions and users will have to re-authenticate.
- Source
- security-advisories@github.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 8
- Impact score
- 5.8
- Exploitability score
- 1.6
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
- Severity
- HIGH
- security-advisories@github.com
- CWE-384
- Hype score
- Not currently trending
CVE-2025-29928: authentik Session Revocation Vulnerability https://t.co/DGjjZyUvDy
@_cvereports
29 Mar 2025
10 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
New post from https://t.co/uXvPWJy6tj (CVE-2025-29928 | goauthentik prior 2024.12.4/2025.2.3 Web Interface/API session fixiation (GHSA-p6p8-f853-9g2p)) has been published on https://t.co/WZl4QbUcMN
@WolfgangSesin
28 Mar 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes